Part of lp.bugs.security View In Hierarchy
This is used for operations that are potentially destructive in some way. They aren't heavily locked down, but only users who appear to be legitimate can perform them.
|Method||checkAuthenticated||Allow sufficiently-trusted users to edit bugs.|
|Method||checkUnauthenticated||Never allow unauthenticated users to edit a bug.|
|Method||_hasAnyRole||Return True if the user has any role on any of these bug targets.|
Inherited from AuthorizationBase:
|Method||checkPermissionIsRegistered||Pass through to checkPermission.|
|Method||forwardCheckAuthenticated||Forward request to another security adapter.|
|Method||forwardCheckUnauthenticated||Forward request to another security adapter.|
Only users who can append to the bug can edit it; in addition, only users who seem to be generally legitimate or who have a relevant role on one of the targets of the bug can edit the bug.